Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

That little thing that you stick in your computer to store or transfer data can also mean very bad news. The USB device or “flash drive” can be reconfigured to work like a little thief, for instance, being made to mimic a keyboard and take instructions from the master thief to rip off data or ins...
09/29/2014
We have all heard about the real estate agent who has become a crime statistic. Most of you figure it won’t happen to you. You're right: chances are, it won't. However Real Estate is considered by security experts and law enforcement to be a high-risk profession. Agents are mobile, usually work a...
09/29/2014
The last group of college students has headed off to school for another semester of dorm rooms, late-night library sessions, and the occasional college party. For many students, college is the first time they’ve lived away from home. They are young, open to new things, and sometimes, naïve. These...
09/26/2014
How did a burglar know that Theresa Roemer had a 3,000 square foot, three-level closet that was crammed full of very pricey items including jewels and furs? Well, apparently, he caught wind of the “she cave” on TV, then perhaps Google Earthed it and (believe it or not) the evening he decided to b...
09/25/2014
One out of 2,900 seems very small, but when there’s a total of 105 million…then this percentage stacks up in the end. It represents the frequency of calls from fraudsters made to call centers in an attempt to get customer account details so they could steal. Many times these crooks will succeed b...
09/24/2014
Burglars are opportunists. They seek out opportunity often to support a drug habit or other uncivil reasons for turning your stuff into cash. Burglaries and burglars come in different flavors, here’s a taste. Simple burglary: The act of entering any type of structure without permission (regardles...
09/23/2014
Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked. After the attack, locate the portal through which the crumb-bag entered. This could be the e-mail program or browser. This may be e...
09/22/2014
Many of us are familiar with the Jetson’s TV cartoon that showed the life of a family in 2026 and how technology is a part of their everyday life. If you’re like me, some of the gadgets that George and his family had are probably things you thought were cool or would be convenient to have, especi...
09/20/2014
Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people Top 10 Most Popular Facebook Scams Profile visitor stats. It’s all about vanity. It doesn’t take long for any new Facebook user to see an ad offering to reveal how many people are viewing your profile. You...
09/19/2014
Fainting, or “blacking out,” has numerous causes. Sometimes the person “comes to” quickly (e.g., the cause is prolonged standing in heat), or the person won’t respond (illness), and this kind of cause can be life threatening. Signs someone’s about to faint include frequent yawning, chest tightnes...
09/18/2014